Umm, attacks are usually remote. Not from the datacenter staff. I would see what vulnerable ports you have installed. I suspect you have not kept up with security releases and someone has exploited one.

I would have loved to see what was in sshd0, among other files on your system. did you "rm" that directory completely? if your running inetd, shut that off and if you do need it, comment out # all the 9000 plus lines that are open on there.

research various ssh attacks on various hack sites, and see what you can find regarding dan's comment, what ports are installed, and to really get things done, work with nessus to see what exploits are known on your server from here on out, otherwise, you just might "owned" again.

There are lots of monitor progs out there; monit, fam, so forth in /usr/ports that will email you quickly when something is touched, chown'd, etc... on critical files and entire directories.

Unfortunately, there are ways to stop email from "getting out" to you, as these types of services are halted before the crack gets to work.